- 1 Acronym
- 2 Alternate name(s)
- 3 Main dependent construct(s)/factor(s)
- 4 Main independent construct(s)/factor(s)
- 5 Concise description of theory
- 6 Diagram/schematic of theory
- 7 Originating author(s)
- 8 Seminal articles
- 9 Originating area
- 10 Level of analysis
- 11 Links to WWW sites describing theory
- 12 Links from this theory to other theories
- 13 IS articles that use the theory
- 14 External links
- 15 Contributor(s)
- 16 Date last updated
Main dependent construct(s)/factor(s)
- Information resources
Main independent construct(s)/factor(s)
- Actors, offensive operations, defensive operations
Concise description of theory
- The theory of information warfare explains and integrates operations involving a diverse collection of actors and media within a single framework. The theory is centered on the value of information resources that hold information and on "win-lose" operations that affect that value. Offensive and defensive information warfare is expressed in terms of actors, targets, methods, technologies, outcomes, policies, and laws. Information warfare can target or exploit any type of information resources--physical environments, print and storage media, broadcast media, telecommunications, and computers and computer networks.
Diagram/schematic of theory
- Dorothy Elizabeth Robling Denning
- Denning, D. E. R. (1999). Information warfare and security (8th ed.). MA, USA: ACM Press Books.
- Computer science
Level of analysis
Links to WWW sites describing theory
Links from this theory to other theories
IS articles that use the theory
- Belkhouja, T., Du, X., Mohamed, A., Al-Ali, A. K., & Guizani, M. (2018). Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems. Journal of Sensor and Actuator Networks, 7(2), 21.
- Caforio, G., & Nuciari, M. (2018). Conclusion: Themes and Issues of the Sociology of the Military. In Handbook of the Sociology of the Military (pp. 615-650). Springer, Cham.
- Cullen, F. T. (2017). Terrorism and the Internet: Resistance in the Information Age. In Technology and Terrorism (pp. 125-154). Routledge.
- Lin, T. C., Hsu, J. S. C., Wang, Y. C., & Wu, S. (2018). Examining the antecedents of employee unauthorized computer access. Journal of Statistics and Management Systems, 21(3), 493-517.
- Loui, R., & Hope, W. (2017, November). Information Warfare Amplified by Cyberwarfare and Hacking the National Knowledge Infrastructure. In Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence & Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2017 IEEE 15th Intl (pp. 280-283). IEEE.
- Onibere, M., Ahmad, A., & Maynard, S. (2017, July). The Chief Information Security Officer and the Five Dimensions of a Strategist. the Pacific Asia Conference on Information Systems, Langkawi, Malaysia.
- Petrenko, S. (2018). The Relevance of the Early Warning of Cyber-attacks. In Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (pp. 1-60). Springer, Cham.
- Valeriano, B., & Maness, R. C. (2018). Cyber Strategy: The Evolving Character of Power and Coercion. Oxford University Press.
- Craig Horne
Date last updated
- 27 July 2018
Please feel free to make modifications to this site. In order to do so, you must register.